Just thought I would let you know about this new site where you can download over 5000 proxies at a time for free (normally sits around 7500). You can download by anonymity level (transparent, anonymous, elite), by location (eastern europe, western europe, north america, asia, middle east) or just download the entire list.

The lists are updated every 30 minutes without fail and are, as I have already said above, completly free. They are now the biggest supplier of free proxy lists in the world... a lot bigger then HMA thats for sure!

They also offer anonymous emailing services, a web proxy & a referrer stripping service so that you can anonymise your links, send anonymous email and bypass filters at school / uni etc. I have been using the email service for a variety of things and I have found it to be pretty good.

Just thought I would let you know about this new site where you can download over 5000 proxies at a time for free (normally sits around 7500). You can download by anonymity level (transparent, anonymous, elite), by location (eastern europe, western europe, north america, asia, middle east) or just download the entire list.

The lists are updated every 30 minutes without fail and are, as I have already said above, completly free. They are now the biggest supplier of free proxy lists in the world... a lot bigger then HMA thats for sure!

They also offer anonymous emailing services, a web proxy & a referrer stripping service so that you can anonymise your links, send anonymous email and bypass filters at school / uni etc. I have been using the email service for a variety of things and I have found it to be pretty good.

Self-advertising fail. Also, why wouldn't people just use TOR if they want so much security?

Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning. -Rick Cook

mShred wrote:Maybe because Tor isn't the all-perfect unbreakable thing you make it out to be.

I'm well aware that nothing is perfectly secure, including TOR. However, TOR has a much better chance of being secure and anonymous versus a few random proxies posted on another random site. This is mainly due to the fact that:

1. TOR servers have a higher tendency to encrypt all incoming/outgoing traffic2. TOR servers have a higher tendency to not keep a log of all traffic3. The TOR browser itself doesn't keep a history, tries to enforce HTTP everywhere, and tries to disable Javascript if it can. All of this functionality comes built in, so there is a lower probability that you may mess up from just being forgetful and or just being ignorant. 4. TOR goes through multiple proxies, rather than just one, making it much more difficult for someone to track you. 5. Depending on the site, TOR exclusive sites (.onion) may also encrypt/not log all or most of your traffic to the point that your own ISP will have quite the difficult deciphering what exactly you were doing.

This, once again, like mShred said, IS NOT PERFECT, I can't stress this enough. All TOR does is give you a higher probability of being anonymous, as perfect/permanent anonymity (whilst connected to the Internet) is just as much a myth as Goatboy not being awesome. You can always get by perfectly free using HideMyAss, or get caught while using TOR.

I apologize if I've been making TOR seem as though it is the Higgs Boson on a computer, it was not meant, or true. However, like I previous stated, anonymity is a numbers game, but I personally will prefer to take the numbers that give me a higher chance.

~Cent

Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning. -Rick Cook

Adding to centip3de post.One unique feature that TOR has, is packet segmentation, on the entry point of the tor network the packet is segmented, and sent thru tor network, and rebuild on the output server, this makes it harder to track thru where the packet has been.